Renamse privatecloud to cloud
Signed-off-by: Emilien Macchi <emilien.macchi@enovance.com>
This commit is contained in:
@@ -32,4 +32,4 @@ fixtures:
|
|||||||
'stdlib': 'git://github.com/puppetlabs/puppetlabs-stdlib.git'
|
'stdlib': 'git://github.com/puppetlabs/puppetlabs-stdlib.git'
|
||||||
'xinetd': 'git://github.com/puppetlabs/puppetlabs-xinetd.git'
|
'xinetd': 'git://github.com/puppetlabs/puppetlabs-xinetd.git'
|
||||||
symlinks:
|
symlinks:
|
||||||
'privatecloud': '#{source_dir}'
|
'cloud': '#{source_dir}'
|
||||||
|
@@ -13,13 +13,13 @@
|
|||||||
# License for the specific language governing permissions and limitations
|
# License for the specific language governing permissions and limitations
|
||||||
# under the License.
|
# under the License.
|
||||||
#
|
#
|
||||||
# == Class: privatecloud::automation
|
# == Class: cloud::automation
|
||||||
#
|
#
|
||||||
# Installs the Automation Server (puppet master)
|
# Installs the Automation Server (puppet master)
|
||||||
#
|
#
|
||||||
#
|
#
|
||||||
|
|
||||||
class privatecloud::automation{
|
class cloud::automation{
|
||||||
|
|
||||||
# Ensure git is installed
|
# Ensure git is installed
|
||||||
class { 'git': }
|
class { 'git': }
|
||||||
|
@@ -13,7 +13,7 @@
|
|||||||
# License for the specific language governing permissions and limitations
|
# License for the specific language governing permissions and limitations
|
||||||
# under the License.
|
# under the License.
|
||||||
#
|
#
|
||||||
# == Class: privatecloud::cache
|
# == Class: cloud::cache
|
||||||
#
|
#
|
||||||
# Install a cache server (used by OpenStack services)
|
# Install a cache server (used by OpenStack services)
|
||||||
#
|
#
|
||||||
@@ -24,7 +24,7 @@
|
|||||||
# Default to $::ipaddress_eth0
|
# Default to $::ipaddress_eth0
|
||||||
#
|
#
|
||||||
|
|
||||||
class privatecloud::cache (
|
class cloud::cache (
|
||||||
$listen_ip = $::ipaddress_eth0,
|
$listen_ip = $::ipaddress_eth0,
|
||||||
){
|
){
|
||||||
|
|
||||||
|
@@ -13,7 +13,7 @@
|
|||||||
# License for the specific language governing permissions and limitations
|
# License for the specific language governing permissions and limitations
|
||||||
# under the License.
|
# under the License.
|
||||||
#
|
#
|
||||||
# == Class: privatecloud::compute
|
# == Class: cloud::compute
|
||||||
#
|
#
|
||||||
# Common class for compute nodes
|
# Common class for compute nodes
|
||||||
#
|
#
|
||||||
@@ -56,7 +56,7 @@
|
|||||||
# Default value in params
|
# Default value in params
|
||||||
#
|
#
|
||||||
|
|
||||||
class privatecloud::compute(
|
class cloud::compute(
|
||||||
$nova_db_host = $os_params::nova_db_host,
|
$nova_db_host = $os_params::nova_db_host,
|
||||||
$nova_db_user = $os_params::nova_db_user,
|
$nova_db_user = $os_params::nova_db_user,
|
||||||
$nova_db_password = $os_params::nova_db_password,
|
$nova_db_password = $os_params::nova_db_password,
|
||||||
|
@@ -16,7 +16,7 @@
|
|||||||
# Compute controller node
|
# Compute controller node
|
||||||
#
|
#
|
||||||
|
|
||||||
class privatecloud::compute::controller(
|
class cloud::compute::controller(
|
||||||
$ks_keystone_internal_host = $os_params::ks_keystone_internal_host,
|
$ks_keystone_internal_host = $os_params::ks_keystone_internal_host,
|
||||||
$ks_nova_password = $os_params::ks_nova_password,
|
$ks_nova_password = $os_params::ks_nova_password,
|
||||||
$neutron_metadata_proxy_shared_secret = $os_params::neutron_metadata_proxy_shared_secret,
|
$neutron_metadata_proxy_shared_secret = $os_params::neutron_metadata_proxy_shared_secret,
|
||||||
@@ -27,7 +27,7 @@ class privatecloud::compute::controller(
|
|||||||
$ks_metadata_public_port = $os_params::ks_metadata_public_port
|
$ks_metadata_public_port = $os_params::ks_metadata_public_port
|
||||||
){
|
){
|
||||||
|
|
||||||
include 'privatecloud::compute'
|
include 'cloud::compute'
|
||||||
|
|
||||||
class { [
|
class { [
|
||||||
'nova::scheduler',
|
'nova::scheduler',
|
||||||
|
@@ -16,7 +16,7 @@
|
|||||||
# Hypervisor Compute node
|
# Hypervisor Compute node
|
||||||
#
|
#
|
||||||
|
|
||||||
class privatecloud::compute::hypervisor(
|
class cloud::compute::hypervisor(
|
||||||
$api_eth = $os_params::api_eth,
|
$api_eth = $os_params::api_eth,
|
||||||
$libvirt_type = $os_params::libvirt_type,
|
$libvirt_type = $os_params::libvirt_type,
|
||||||
$ks_nova_internal_proto = $os_params::ks_nova_internal_proto,
|
$ks_nova_internal_proto = $os_params::ks_nova_internal_proto,
|
||||||
@@ -27,7 +27,7 @@ class privatecloud::compute::hypervisor(
|
|||||||
$has_ceph = false
|
$has_ceph = false
|
||||||
) {
|
) {
|
||||||
|
|
||||||
include 'privatecloud::compute'
|
include 'cloud::compute'
|
||||||
|
|
||||||
exec { 'insert_module_nbd':
|
exec { 'insert_module_nbd':
|
||||||
command => '/bin/echo "nbd" > /etc/modules',
|
command => '/bin/echo "nbd" > /etc/modules',
|
||||||
|
@@ -13,7 +13,7 @@
|
|||||||
# License for the specific language governing permissions and limitations
|
# License for the specific language governing permissions and limitations
|
||||||
# under the License.
|
# under the License.
|
||||||
#
|
#
|
||||||
# == Class: privatecloud::dashboard
|
# == Class: cloud::dashboard
|
||||||
#
|
#
|
||||||
# Installs the OpenStack Dashboard (Horizon)
|
# Installs the OpenStack Dashboard (Horizon)
|
||||||
#
|
#
|
||||||
@@ -42,7 +42,7 @@
|
|||||||
# Defaults false
|
# Defaults false
|
||||||
#
|
#
|
||||||
|
|
||||||
class privatecloud::dashboard(
|
class cloud::dashboard(
|
||||||
$ks_keystone_internal_host = $os_params::ks_keystone_internal_host,
|
$ks_keystone_internal_host = $os_params::ks_keystone_internal_host,
|
||||||
$secret_key = $os_params::secret_key,
|
$secret_key = $os_params::secret_key,
|
||||||
$horizon_port = $os_params::horizon_port,
|
$horizon_port = $os_params::horizon_port,
|
||||||
|
@@ -13,11 +13,11 @@
|
|||||||
# License for the specific language governing permissions and limitations
|
# License for the specific language governing permissions and limitations
|
||||||
# under the License.
|
# under the License.
|
||||||
#
|
#
|
||||||
# == Class: privatecloud::database::nosql
|
# == Class: cloud::database::nosql
|
||||||
#
|
#
|
||||||
# Install a nosql server (MongoDB)
|
# Install a nosql server (MongoDB)
|
||||||
#
|
#
|
||||||
class privatecloud::database::nosql(
|
class cloud::database::nosql(
|
||||||
$bind_ip = undef,
|
$bind_ip = undef,
|
||||||
) {
|
) {
|
||||||
|
|
||||||
|
@@ -16,7 +16,7 @@
|
|||||||
# MySQL Galera Node
|
# MySQL Galera Node
|
||||||
#
|
#
|
||||||
|
|
||||||
class privatecloud::database::sql (
|
class cloud::database::sql (
|
||||||
$api_eth = $os_params::api_eth,
|
$api_eth = $os_params::api_eth,
|
||||||
$service_provider = sysv,
|
$service_provider = sysv,
|
||||||
$galera_nextserver = $os_params::galera_nextserver,
|
$galera_nextserver = $os_params::galera_nextserver,
|
||||||
@@ -197,7 +197,7 @@ basedir = /usr
|
|||||||
mysql::server::config{'basic_config':
|
mysql::server::config{'basic_config':
|
||||||
notify_service => false,
|
notify_service => false,
|
||||||
notify => Exec['clean-mysql-binlog'],
|
notify => Exec['clean-mysql-binlog'],
|
||||||
settings => template('privatecloud/database/mysql.conf.erb')
|
settings => template('cloud/database/mysql.conf.erb')
|
||||||
}
|
}
|
||||||
|
|
||||||
exec{'clean-mysql-binlog':
|
exec{'clean-mysql-binlog':
|
||||||
|
@@ -13,7 +13,7 @@
|
|||||||
# License for the specific language governing permissions and limitations
|
# License for the specific language governing permissions and limitations
|
||||||
# under the License.
|
# under the License.
|
||||||
#
|
#
|
||||||
# == Class: privatecloud::identity
|
# == Class: cloud::identity
|
||||||
#
|
#
|
||||||
# Install Identity Server (Keystone)
|
# Install Identity Server (Keystone)
|
||||||
#
|
#
|
||||||
@@ -316,7 +316,7 @@
|
|||||||
# Default value in params
|
# Default value in params
|
||||||
#
|
#
|
||||||
|
|
||||||
class privatecloud::identity (
|
class cloud::identity (
|
||||||
$identity_roles_addons = $os_params::identity_roles_addons,
|
$identity_roles_addons = $os_params::identity_roles_addons,
|
||||||
$keystone_db_host = $os_params::keystone_db_host,
|
$keystone_db_host = $os_params::keystone_db_host,
|
||||||
$keystone_db_user = $os_params::keystone_db_user,
|
$keystone_db_user = $os_params::keystone_db_user,
|
||||||
|
@@ -13,7 +13,7 @@
|
|||||||
# License for the specific language governing permissions and limitations
|
# License for the specific language governing permissions and limitations
|
||||||
# under the License.
|
# under the License.
|
||||||
#
|
#
|
||||||
# == Class: privatecloud::image
|
# == Class: cloud::image
|
||||||
#
|
#
|
||||||
# Install Image Server (Glance)
|
# Install Image Server (Glance)
|
||||||
#
|
#
|
||||||
@@ -56,7 +56,7 @@
|
|||||||
# Default value in params
|
# Default value in params
|
||||||
#
|
#
|
||||||
|
|
||||||
class privatecloud::image(
|
class cloud::image(
|
||||||
$glance_db_host = $os_params::glance_db_host,
|
$glance_db_host = $os_params::glance_db_host,
|
||||||
$glance_db_user = $os_params::glance_db_user,
|
$glance_db_user = $os_params::glance_db_user,
|
||||||
$glance_db_password = $os_params::glance_db_password,
|
$glance_db_password = $os_params::glance_db_password,
|
||||||
|
@@ -13,12 +13,12 @@
|
|||||||
# License for the specific language governing permissions and limitations
|
# License for the specific language governing permissions and limitations
|
||||||
# under the License.
|
# under the License.
|
||||||
#
|
#
|
||||||
# Class: privatecloud
|
# Class: cloud
|
||||||
#
|
#
|
||||||
# Installs the private cloud system requirements
|
# Installs the private cloud system requirements
|
||||||
#
|
#
|
||||||
|
|
||||||
class privatecloud {
|
class cloud {
|
||||||
|
|
||||||
# motd
|
# motd
|
||||||
file
|
file
|
||||||
|
@@ -16,7 +16,7 @@
|
|||||||
# HAproxy nodes
|
# HAproxy nodes
|
||||||
#
|
#
|
||||||
|
|
||||||
class privatecloud::loadbalancer(
|
class cloud::loadbalancer(
|
||||||
$ceilometer_api = true,
|
$ceilometer_api = true,
|
||||||
$cinder_api = true,
|
$cinder_api = true,
|
||||||
$glance_api = true,
|
$glance_api = true,
|
||||||
@@ -162,7 +162,7 @@ monitor fail if horizon_dead
|
|||||||
}
|
}
|
||||||
|
|
||||||
if $keystone_api {
|
if $keystone_api {
|
||||||
privatecloud::loadbalancer::listen_http {
|
cloud::loadbalancer::listen_http {
|
||||||
'keystone_api_cluster':
|
'keystone_api_cluster':
|
||||||
ports => $ks_keystone_public_port,
|
ports => $ks_keystone_public_port,
|
||||||
listen_ip => $openstack_vip;
|
listen_ip => $openstack_vip;
|
||||||
@@ -172,7 +172,7 @@ monitor fail if horizon_dead
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
if $swift_api {
|
if $swift_api {
|
||||||
privatecloud::loadbalancer::listen_http{
|
cloud::loadbalancer::listen_http{
|
||||||
'swift_api_cluster':
|
'swift_api_cluster':
|
||||||
ports => $ks_swift_public_port,
|
ports => $ks_swift_public_port,
|
||||||
httpchk => 'httpchk /healthcheck',
|
httpchk => 'httpchk /healthcheck',
|
||||||
@@ -180,28 +180,28 @@ monitor fail if horizon_dead
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
if $nova_api {
|
if $nova_api {
|
||||||
privatecloud::loadbalancer::listen_http{
|
cloud::loadbalancer::listen_http{
|
||||||
'nova_api_cluster':
|
'nova_api_cluster':
|
||||||
ports => $ks_nova_public_port,
|
ports => $ks_nova_public_port,
|
||||||
listen_ip => $openstack_vip;
|
listen_ip => $openstack_vip;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
if $ec2_api {
|
if $ec2_api {
|
||||||
privatecloud::loadbalancer::listen_http{
|
cloud::loadbalancer::listen_http{
|
||||||
'ec2_api_cluster':
|
'ec2_api_cluster':
|
||||||
ports => $ks_ec2_public_port,
|
ports => $ks_ec2_public_port,
|
||||||
listen_ip => $openstack_vip;
|
listen_ip => $openstack_vip;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
if $metadata_api {
|
if $metadata_api {
|
||||||
privatecloud::loadbalancer::listen_http{
|
cloud::loadbalancer::listen_http{
|
||||||
'metadata_api_cluster':
|
'metadata_api_cluster':
|
||||||
ports => $ks_metadata_public_port,
|
ports => $ks_metadata_public_port,
|
||||||
listen_ip => $openstack_vip;
|
listen_ip => $openstack_vip;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
if $spice {
|
if $spice {
|
||||||
privatecloud::loadbalancer::listen_http{
|
cloud::loadbalancer::listen_http{
|
||||||
'spice_cluster':
|
'spice_cluster':
|
||||||
ports => $spice_port,
|
ports => $spice_port,
|
||||||
listen_ip => $openstack_vip,
|
listen_ip => $openstack_vip,
|
||||||
@@ -209,56 +209,56 @@ monitor fail if horizon_dead
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
if $glance_api {
|
if $glance_api {
|
||||||
privatecloud::loadbalancer::listen_http{
|
cloud::loadbalancer::listen_http{
|
||||||
'glance_api_cluster':
|
'glance_api_cluster':
|
||||||
ports => $ks_glance_public_port,
|
ports => $ks_glance_public_port,
|
||||||
listen_ip => $openstack_vip;
|
listen_ip => $openstack_vip;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
if $neutron_api {
|
if $neutron_api {
|
||||||
privatecloud::loadbalancer::listen_http{
|
cloud::loadbalancer::listen_http{
|
||||||
'neutron_api_cluster':
|
'neutron_api_cluster':
|
||||||
ports => $ks_neutron_public_port,
|
ports => $ks_neutron_public_port,
|
||||||
listen_ip => $openstack_vip;
|
listen_ip => $openstack_vip;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
if $cinder_api {
|
if $cinder_api {
|
||||||
privatecloud::loadbalancer::listen_http{
|
cloud::loadbalancer::listen_http{
|
||||||
'cinder_api_cluster':
|
'cinder_api_cluster':
|
||||||
ports => $ks_cinder_public_port,
|
ports => $ks_cinder_public_port,
|
||||||
listen_ip => $openstack_vip;
|
listen_ip => $openstack_vip;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
if $ceilometer_api {
|
if $ceilometer_api {
|
||||||
privatecloud::loadbalancer::listen_http{
|
cloud::loadbalancer::listen_http{
|
||||||
'ceilometer_api_cluster':
|
'ceilometer_api_cluster':
|
||||||
ports => $ks_ceilometer_public_port,
|
ports => $ks_ceilometer_public_port,
|
||||||
listen_ip => $openstack_vip;
|
listen_ip => $openstack_vip;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
if $heat_api {
|
if $heat_api {
|
||||||
privatecloud::loadbalancer::listen_http{
|
cloud::loadbalancer::listen_http{
|
||||||
'heat_api_cluster':
|
'heat_api_cluster':
|
||||||
ports => $ks_heat_public_port,
|
ports => $ks_heat_public_port,
|
||||||
listen_ip => $openstack_vip;
|
listen_ip => $openstack_vip;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
if $heat_cfn_api {
|
if $heat_cfn_api {
|
||||||
privatecloud::loadbalancer::listen_http{
|
cloud::loadbalancer::listen_http{
|
||||||
'heat_api_cfn_cluster':
|
'heat_api_cfn_cluster':
|
||||||
ports => $ks_heat_cfn_public_port,
|
ports => $ks_heat_cfn_public_port,
|
||||||
listen_ip => $openstack_vip;
|
listen_ip => $openstack_vip;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
if $heat_cloudwatch_api {
|
if $heat_cloudwatch_api {
|
||||||
privatecloud::loadbalancer::listen_http{
|
cloud::loadbalancer::listen_http{
|
||||||
'heat_api_cloudwatch_cluster':
|
'heat_api_cloudwatch_cluster':
|
||||||
ports => $ks_heat_cloudwatch_public_port,
|
ports => $ks_heat_cloudwatch_public_port,
|
||||||
listen_ip => $openstack_vip;
|
listen_ip => $openstack_vip;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
if $horizon {
|
if $horizon {
|
||||||
privatecloud::loadbalancer::listen_http{
|
cloud::loadbalancer::listen_http{
|
||||||
'horizon_cluster':
|
'horizon_cluster':
|
||||||
ports => $horizon_port,
|
ports => $horizon_port,
|
||||||
listen_ip => $openstack_vip;
|
listen_ip => $openstack_vip;
|
||||||
|
@@ -15,9 +15,9 @@
|
|||||||
#
|
#
|
||||||
# Define::
|
# Define::
|
||||||
#
|
#
|
||||||
# privatecloud::loadbalancer::listen_http
|
# cloud::loadbalancer::listen_http
|
||||||
#
|
#
|
||||||
define privatecloud::loadbalancer::listen_http(
|
define cloud::loadbalancer::listen_http(
|
||||||
$ports = 'unset',
|
$ports = 'unset',
|
||||||
$httpchk = 'httpchk',
|
$httpchk = 'httpchk',
|
||||||
$listen_ip = '0.0.0.0') {
|
$listen_ip = '0.0.0.0') {
|
||||||
|
@@ -13,7 +13,7 @@
|
|||||||
# License for the specific language governing permissions and limitations
|
# License for the specific language governing permissions and limitations
|
||||||
# under the License.
|
# under the License.
|
||||||
#
|
#
|
||||||
# == Class: privatecloud::messaging
|
# == Class: cloud::messaging
|
||||||
#
|
#
|
||||||
# Install Messsaging Server (RabbitMQ)
|
# Install Messsaging Server (RabbitMQ)
|
||||||
#
|
#
|
||||||
@@ -28,7 +28,7 @@
|
|||||||
# Default value in params
|
# Default value in params
|
||||||
#
|
#
|
||||||
|
|
||||||
class privatecloud::messaging(
|
class cloud::messaging(
|
||||||
$rabbit_hosts = $os_params::rabbit_hosts,
|
$rabbit_hosts = $os_params::rabbit_hosts,
|
||||||
$rabbit_names = $os_params::rabbit_names,
|
$rabbit_names = $os_params::rabbit_names,
|
||||||
$rabbit_password = $os_params::rabbit_password
|
$rabbit_password = $os_params::rabbit_password
|
||||||
|
@@ -13,7 +13,7 @@
|
|||||||
# License for the specific language governing permissions and limitations
|
# License for the specific language governing permissions and limitations
|
||||||
# under the License.
|
# under the License.
|
||||||
#
|
#
|
||||||
# == Class: privatecloud::network
|
# == Class: cloud::network
|
||||||
#
|
#
|
||||||
# Common class for network nodes
|
# Common class for network nodes
|
||||||
#
|
#
|
||||||
@@ -40,7 +40,7 @@
|
|||||||
# Default value in params
|
# Default value in params
|
||||||
#
|
#
|
||||||
|
|
||||||
class privatecloud::network(
|
class cloud::network(
|
||||||
$verbose = $os_params::verbose,
|
$verbose = $os_params::verbose,
|
||||||
$debug = $os_params::debug,
|
$debug = $os_params::debug,
|
||||||
$rabbit_hosts = $os_params::rabbit_hosts,
|
$rabbit_hosts = $os_params::rabbit_hosts,
|
||||||
|
@@ -16,13 +16,13 @@
|
|||||||
# Network Compute node (Agent)
|
# Network Compute node (Agent)
|
||||||
#
|
#
|
||||||
|
|
||||||
class privatecloud::network::compute(
|
class cloud::network::compute(
|
||||||
$neutron_endpoint = $os_params::ks_neutron_admin_host,
|
$neutron_endpoint = $os_params::ks_neutron_admin_host,
|
||||||
$neutron_protocol = $os_params::ks_neutron_public_proto,
|
$neutron_protocol = $os_params::ks_neutron_public_proto,
|
||||||
$neutron_password = $os_params::ks_neutron_password,
|
$neutron_password = $os_params::ks_neutron_password,
|
||||||
) {
|
) {
|
||||||
|
|
||||||
include 'privatecloud::network'
|
include 'cloud::network'
|
||||||
|
|
||||||
class { 'nova::network::neutron':
|
class { 'nova::network::neutron':
|
||||||
neutron_admin_password => $neutron_password,
|
neutron_admin_password => $neutron_password,
|
||||||
|
@@ -16,7 +16,7 @@
|
|||||||
# Network Controller node (API + Scheduler)
|
# Network Controller node (API + Scheduler)
|
||||||
#
|
#
|
||||||
|
|
||||||
class privatecloud::network::controller(
|
class cloud::network::controller(
|
||||||
$neutron_db_host = $os_params::neutron_db_host,
|
$neutron_db_host = $os_params::neutron_db_host,
|
||||||
$neutron_db_user = $os_params::neutron_db_user,
|
$neutron_db_user = $os_params::neutron_db_user,
|
||||||
$neutron_db_password = $os_params::neutron_db_password,
|
$neutron_db_password = $os_params::neutron_db_password,
|
||||||
@@ -29,7 +29,7 @@ class privatecloud::network::controller(
|
|||||||
$public_cidr = $os_params::public_cidr
|
$public_cidr = $os_params::public_cidr
|
||||||
) {
|
) {
|
||||||
|
|
||||||
include 'privatecloud::network'
|
include 'cloud::network'
|
||||||
|
|
||||||
$encoded_user = uriescape($neutron_db_user)
|
$encoded_user = uriescape($neutron_db_user)
|
||||||
$encoded_password = uriescape($neutron_db_password)
|
$encoded_password = uriescape($neutron_db_password)
|
||||||
|
@@ -16,11 +16,11 @@
|
|||||||
# Network DHCP node
|
# Network DHCP node
|
||||||
#
|
#
|
||||||
|
|
||||||
class privatecloud::network::dhcp(
|
class cloud::network::dhcp(
|
||||||
$debug = $os_params::debug
|
$debug = $os_params::debug
|
||||||
) {
|
) {
|
||||||
|
|
||||||
include 'privatecloud::network'
|
include 'cloud::network'
|
||||||
|
|
||||||
class { 'neutron::agents::dhcp':
|
class { 'neutron::agents::dhcp':
|
||||||
debug => $debug
|
debug => $debug
|
||||||
|
@@ -16,12 +16,12 @@
|
|||||||
# Network L3 node
|
# Network L3 node
|
||||||
#
|
#
|
||||||
|
|
||||||
class privatecloud::network::l3(
|
class cloud::network::l3(
|
||||||
$external_int = $os_params::external_int,
|
$external_int = $os_params::external_int,
|
||||||
$debug = $os_params::debug,
|
$debug = $os_params::debug,
|
||||||
) {
|
) {
|
||||||
|
|
||||||
include 'privatecloud::network'
|
include 'cloud::network'
|
||||||
|
|
||||||
class { 'neutron::agents::l3':
|
class { 'neutron::agents::l3':
|
||||||
debug => $debug,
|
debug => $debug,
|
||||||
|
@@ -16,11 +16,11 @@
|
|||||||
# Network LBaaS node
|
# Network LBaaS node
|
||||||
#
|
#
|
||||||
|
|
||||||
class privatecloud::network::lbaas(
|
class cloud::network::lbaas(
|
||||||
$debug = $os_params::debug
|
$debug = $os_params::debug
|
||||||
) {
|
) {
|
||||||
|
|
||||||
include 'privatecloud::network'
|
include 'cloud::network'
|
||||||
|
|
||||||
class { 'neutron::agents::lbaas':
|
class { 'neutron::agents::lbaas':
|
||||||
debug => $debug,
|
debug => $debug,
|
||||||
|
@@ -17,7 +17,7 @@
|
|||||||
# Could be managed by spof_node manifest
|
# Could be managed by spof_node manifest
|
||||||
#
|
#
|
||||||
|
|
||||||
class privatecloud::network::metadata(
|
class cloud::network::metadata(
|
||||||
$enabled = true,
|
$enabled = true,
|
||||||
$debug = $os_params::debug,
|
$debug = $os_params::debug,
|
||||||
$ks_neutron_password = $os_params::ks_neutron_password,
|
$ks_neutron_password = $os_params::ks_neutron_password,
|
||||||
@@ -28,7 +28,7 @@ class privatecloud::network::metadata(
|
|||||||
$ks_keystone_admin_host = $os_params::ks_keystone_admin_host
|
$ks_keystone_admin_host = $os_params::ks_keystone_admin_host
|
||||||
) {
|
) {
|
||||||
|
|
||||||
include 'privatecloud::network'
|
include 'cloud::network'
|
||||||
|
|
||||||
class { 'neutron::agents::metadata':
|
class { 'neutron::agents::metadata':
|
||||||
enabled => $enabled,
|
enabled => $enabled,
|
||||||
|
@@ -16,9 +16,9 @@
|
|||||||
# Network VPNaaS node
|
# Network VPNaaS node
|
||||||
#
|
#
|
||||||
|
|
||||||
class privatecloud::network::vpn{
|
class cloud::network::vpn{
|
||||||
|
|
||||||
include 'privatecloud::network'
|
include 'cloud::network'
|
||||||
|
|
||||||
class { 'neutron::agents::vpnaas': }
|
class { 'neutron::agents::vpnaas': }
|
||||||
|
|
||||||
|
@@ -13,7 +13,7 @@
|
|||||||
# License for the specific language governing permissions and limitations
|
# License for the specific language governing permissions and limitations
|
||||||
# under the License.
|
# under the License.
|
||||||
#
|
#
|
||||||
# == Class: privatecloud::object
|
# == Class: cloud::object
|
||||||
#
|
#
|
||||||
# Common class for object storage nodes
|
# Common class for object storage nodes
|
||||||
#
|
#
|
||||||
@@ -24,7 +24,7 @@
|
|||||||
# Default value in params
|
# Default value in params
|
||||||
#
|
#
|
||||||
|
|
||||||
class privatecloud::object(
|
class cloud::object(
|
||||||
$swift_hash_suffix = $os_params::swift_hash_suffix
|
$swift_hash_suffix = $os_params::swift_hash_suffix
|
||||||
) {
|
) {
|
||||||
|
|
||||||
@@ -34,6 +34,6 @@ class privatecloud::object(
|
|||||||
swift_hash_suffix => $swift_hash_suffix,
|
swift_hash_suffix => $swift_hash_suffix,
|
||||||
}
|
}
|
||||||
|
|
||||||
class {'privatecloud::object::tweaking': }
|
class {'cloud::object::tweaking': }
|
||||||
|
|
||||||
}
|
}
|
||||||
|
@@ -16,7 +16,7 @@
|
|||||||
# Swift Proxy node
|
# Swift Proxy node
|
||||||
#
|
#
|
||||||
|
|
||||||
class privatecloud::object::controller(
|
class cloud::object::controller(
|
||||||
$ks_keystone_admin_host = $os_params::ks_keystone_admin_host,
|
$ks_keystone_admin_host = $os_params::ks_keystone_admin_host,
|
||||||
$ks_keystone_admin_port = $os_params::ks_keystone_admin_port,
|
$ks_keystone_admin_port = $os_params::ks_keystone_admin_port,
|
||||||
$ks_keystone_internal_host = $os_params::ks_keystone_internal_host,
|
$ks_keystone_internal_host = $os_params::ks_keystone_internal_host,
|
||||||
@@ -30,7 +30,7 @@ class privatecloud::object::controller(
|
|||||||
$api_eth = $os_params::api_eth,
|
$api_eth = $os_params::api_eth,
|
||||||
) {
|
) {
|
||||||
|
|
||||||
include 'privatecloud::object'
|
include 'cloud::object'
|
||||||
|
|
||||||
class { 'swift::proxy':
|
class { 'swift::proxy':
|
||||||
proxy_local_net_ip => $api_eth,
|
proxy_local_net_ip => $api_eth,
|
||||||
|
@@ -16,7 +16,7 @@
|
|||||||
# Swift ring builder node
|
# Swift ring builder node
|
||||||
#
|
#
|
||||||
|
|
||||||
class privatecloud::object::ringbuilder(
|
class cloud::object::ringbuilder(
|
||||||
$rsyncd_ipaddress = ipaddress_eth0,
|
$rsyncd_ipaddress = ipaddress_eth0,
|
||||||
$replicas = $os_params::replicas,
|
$replicas = $os_params::replicas,
|
||||||
$swift_rsync_max_connections = $os_params::swift_rsync_max_connections,
|
$swift_rsync_max_connections = $os_params::swift_rsync_max_connections,
|
||||||
@@ -26,7 +26,7 @@ class privatecloud::object::ringbuilder(
|
|||||||
Ring_container_device <<| |>>
|
Ring_container_device <<| |>>
|
||||||
Ring_account_device <<| |>>
|
Ring_account_device <<| |>>
|
||||||
|
|
||||||
Class['swift'] -> Class['privatecloud::object::ringbuilder']
|
Class['swift'] -> Class['cloud::object::ringbuilder']
|
||||||
|
|
||||||
swift::ringbuilder::create{ ['account', 'container']:
|
swift::ringbuilder::create{ ['account', 'container']:
|
||||||
part_power => 9,
|
part_power => 9,
|
||||||
|
@@ -27,7 +27,7 @@ define set_io_scheduler(){
|
|||||||
}
|
}
|
||||||
|
|
||||||
# swift storage
|
# swift storage
|
||||||
class privatecloud::object::storage (
|
class cloud::object::storage (
|
||||||
$storage_eth = $os_params::storage_eth,
|
$storage_eth = $os_params::storage_eth,
|
||||||
$swift_zone = undef,
|
$swift_zone = undef,
|
||||||
$object_port = '6000',
|
$object_port = '6000',
|
||||||
@@ -36,7 +36,7 @@ class privatecloud::object::storage (
|
|||||||
$onloopdevices = false,
|
$onloopdevices = false,
|
||||||
) {
|
) {
|
||||||
|
|
||||||
include 'privatecloud::object'
|
include 'cloud::object'
|
||||||
|
|
||||||
class { 'swift::storage':
|
class { 'swift::storage':
|
||||||
storage_local_net_ip => $storage_eth,
|
storage_local_net_ip => $storage_eth,
|
||||||
|
@@ -16,7 +16,7 @@
|
|||||||
# Swift tweaking
|
# Swift tweaking
|
||||||
#
|
#
|
||||||
|
|
||||||
class privatecloud::object::tweaking {
|
class cloud::object::tweaking {
|
||||||
file {'/etc/sysctl.d/swift-tuning.conf':
|
file {'/etc/sysctl.d/swift-tuning.conf':
|
||||||
content => "
|
content => "
|
||||||
# disable TIME_WAIT.. wait..
|
# disable TIME_WAIT.. wait..
|
||||||
|
@@ -16,7 +16,7 @@
|
|||||||
# Orchestration common node
|
# Orchestration common node
|
||||||
#
|
#
|
||||||
|
|
||||||
class privatecloud::orchestration(
|
class cloud::orchestration(
|
||||||
$ks_keystone_internal_host = $os_params::ks_keystone_internal_host,
|
$ks_keystone_internal_host = $os_params::ks_keystone_internal_host,
|
||||||
$ks_keystone_internal_port = $os_params::ks_keystone_internal_port,
|
$ks_keystone_internal_port = $os_params::ks_keystone_internal_port,
|
||||||
$ks_keystone_internal_proto = $os_params::ks_keystone_internal_proto,
|
$ks_keystone_internal_proto = $os_params::ks_keystone_internal_proto,
|
||||||
|
@@ -16,14 +16,14 @@
|
|||||||
# Orchestration APIs node
|
# Orchestration APIs node
|
||||||
#
|
#
|
||||||
|
|
||||||
class privatecloud::orchestration::api(
|
class cloud::orchestration::api(
|
||||||
$ks_heat_internal_port = $os_params::ks_heat_internal_port,
|
$ks_heat_internal_port = $os_params::ks_heat_internal_port,
|
||||||
$ks_heat_cfn_internal_port = $os_params::ks_heat_cfn_internal_port,
|
$ks_heat_cfn_internal_port = $os_params::ks_heat_cfn_internal_port,
|
||||||
$ks_heat_cloudwatch_internal_port = $os_params::ks_heat_cloudwatch_internal_port,
|
$ks_heat_cloudwatch_internal_port = $os_params::ks_heat_cloudwatch_internal_port,
|
||||||
$api_eth = $os_params::api_eth,
|
$api_eth = $os_params::api_eth,
|
||||||
) {
|
) {
|
||||||
|
|
||||||
include 'privatecloud::orchestration'
|
include 'cloud::orchestration'
|
||||||
|
|
||||||
class { 'heat::api':
|
class { 'heat::api':
|
||||||
bind_host => $api_eth,
|
bind_host => $api_eth,
|
||||||
|
@@ -17,7 +17,7 @@
|
|||||||
# Could be managed by spof node as Active / Passive.
|
# Could be managed by spof node as Active / Passive.
|
||||||
#
|
#
|
||||||
|
|
||||||
class privatecloud::orchestration::engine(
|
class cloud::orchestration::engine(
|
||||||
$enabled = true,
|
$enabled = true,
|
||||||
$ks_heat_public_host = $os_params::ks_heat_public_host,
|
$ks_heat_public_host = $os_params::ks_heat_public_host,
|
||||||
$ks_heat_public_proto = $os_params::ks_heat_public_proto,
|
$ks_heat_public_proto = $os_params::ks_heat_public_proto,
|
||||||
@@ -27,7 +27,7 @@ class privatecloud::orchestration::engine(
|
|||||||
$auth_encryption_key = $os_params::heat_auth_encryption_key
|
$auth_encryption_key = $os_params::heat_auth_encryption_key
|
||||||
) {
|
) {
|
||||||
|
|
||||||
include 'privatecloud::orchestration'
|
include 'cloud::orchestration'
|
||||||
|
|
||||||
class { 'heat::engine':
|
class { 'heat::engine':
|
||||||
enabled => $enabled,
|
enabled => $enabled,
|
||||||
|
@@ -13,7 +13,7 @@
|
|||||||
# License for the specific language governing permissions and limitations
|
# License for the specific language governing permissions and limitations
|
||||||
# under the License.
|
# under the License.
|
||||||
#
|
#
|
||||||
# == Class: privatecloud::spof
|
# == Class: cloud::spof
|
||||||
#
|
#
|
||||||
# Install all SPOF services in active / passive with Pacemaker / Corosync
|
# Install all SPOF services in active / passive with Pacemaker / Corosync
|
||||||
#
|
#
|
||||||
@@ -28,7 +28,7 @@
|
|||||||
# Default to '239.1.1.2'.
|
# Default to '239.1.1.2'.
|
||||||
#
|
#
|
||||||
|
|
||||||
class privatecloud::spof(
|
class cloud::spof(
|
||||||
$cluster_ip = $os_params::cluster_ip,
|
$cluster_ip = $os_params::cluster_ip,
|
||||||
$multicast_address = '239.1.1.2'
|
$multicast_address = '239.1.1.2'
|
||||||
) {
|
) {
|
||||||
@@ -54,7 +54,7 @@ class privatecloud::spof(
|
|||||||
|
|
||||||
Package['corosync'] ->
|
Package['corosync'] ->
|
||||||
file { '/usr/lib/ocf/resource.d/heartbeat/ceilometer-agent-central':
|
file { '/usr/lib/ocf/resource.d/heartbeat/ceilometer-agent-central':
|
||||||
source => 'puppet:///modules/privatecloud/heartbeat/ceilometer-agent-central',
|
source => 'puppet:///modules/cloud/heartbeat/ceilometer-agent-central',
|
||||||
mode => '0755',
|
mode => '0755',
|
||||||
owner => 'root',
|
owner => 'root',
|
||||||
group => 'root',
|
group => 'root',
|
||||||
@@ -78,7 +78,7 @@ class privatecloud::spof(
|
|||||||
|
|
||||||
Package['corosync'] ->
|
Package['corosync'] ->
|
||||||
file { '/usr/lib/ocf/resource.d/heartbeat/neutron-metadata-agent':
|
file { '/usr/lib/ocf/resource.d/heartbeat/neutron-metadata-agent':
|
||||||
source => 'puppet:///modules/privatecloud/heartbeat/neutron-metadata-agent',
|
source => 'puppet:///modules/cloud/heartbeat/neutron-metadata-agent',
|
||||||
mode => '0755',
|
mode => '0755',
|
||||||
owner => 'root',
|
owner => 'root',
|
||||||
group => 'root',
|
group => 'root',
|
||||||
@@ -102,7 +102,7 @@ class privatecloud::spof(
|
|||||||
|
|
||||||
Package['corosync'] ->
|
Package['corosync'] ->
|
||||||
file { '/usr/lib/ocf/resource.d/heartbeat/heat-engine':
|
file { '/usr/lib/ocf/resource.d/heartbeat/heat-engine':
|
||||||
source => 'puppet:///modules/privatecloud/heartbeat/heat-engine',
|
source => 'puppet:///modules/cloud/heartbeat/heat-engine',
|
||||||
mode => '0755',
|
mode => '0755',
|
||||||
owner => 'root',
|
owner => 'root',
|
||||||
group => 'root',
|
group => 'root',
|
||||||
@@ -125,15 +125,15 @@ class privatecloud::spof(
|
|||||||
}
|
}
|
||||||
|
|
||||||
# Run OpenStack SPOF service and disable them since they will be managed by Corosync.
|
# Run OpenStack SPOF service and disable them since they will be managed by Corosync.
|
||||||
class { 'privatecloud::network::metadata':
|
class { 'cloud::network::metadata':
|
||||||
enabled => false,
|
enabled => false,
|
||||||
}
|
}
|
||||||
|
|
||||||
class { 'privatecloud::orchestration::engine':
|
class { 'cloud::orchestration::engine':
|
||||||
enabled => false,
|
enabled => false,
|
||||||
}
|
}
|
||||||
|
|
||||||
class { 'privatecloud::telemetry::centralagent':
|
class { 'cloud::telemetry::centralagent':
|
||||||
enabled => false,
|
enabled => false,
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@@ -14,7 +14,7 @@
|
|||||||
# under the License.
|
# under the License.
|
||||||
#
|
#
|
||||||
|
|
||||||
class privatecloud::storage::rbd (
|
class cloud::storage::rbd (
|
||||||
$fsid = $os_params::ceph_fsid,
|
$fsid = $os_params::ceph_fsid,
|
||||||
$cluster_network = $os_params::ceph_cluster_network,
|
$cluster_network = $os_params::ceph_cluster_network,
|
||||||
$public_network = $os_params::ceph_public_network
|
$public_network = $os_params::ceph_public_network
|
||||||
|
@@ -14,13 +14,13 @@
|
|||||||
# under the License.
|
# under the License.
|
||||||
#
|
#
|
||||||
|
|
||||||
class privatecloud::storage::rbd::monitor (
|
class cloud::storage::rbd::monitor (
|
||||||
$id = $::uniqueid,
|
$id = $::uniqueid,
|
||||||
$mon_addr = $::ipaddress_eth0,
|
$mon_addr = $::ipaddress_eth0,
|
||||||
$monitor_secret = $os_params::ceph_mon_secret
|
$monitor_secret = $os_params::ceph_mon_secret
|
||||||
) {
|
) {
|
||||||
|
|
||||||
include 'privatecloud::storage::rbd'
|
include 'cloud::storage::rbd'
|
||||||
|
|
||||||
ceph::mon { $id:
|
ceph::mon { $id:
|
||||||
monitor_secret => $monitor_secret,
|
monitor_secret => $monitor_secret,
|
||||||
|
@@ -13,13 +13,13 @@
|
|||||||
# License for the specific language governing permissions and limitations
|
# License for the specific language governing permissions and limitations
|
||||||
# under the License.
|
# under the License.
|
||||||
#
|
#
|
||||||
class privatecloud::storage::rbd::osd (
|
class cloud::storage::rbd::osd (
|
||||||
$public_address = $::ipaddress_eth0,
|
$public_address = $::ipaddress_eth0,
|
||||||
$cluster_address = $::ipaddress_eth0,
|
$cluster_address = $::ipaddress_eth0,
|
||||||
$devices = ['sdb','sdc'],
|
$devices = ['sdb','sdc'],
|
||||||
) {
|
) {
|
||||||
|
|
||||||
include 'privatecloud::storage::rbd'
|
include 'cloud::storage::rbd'
|
||||||
|
|
||||||
class { 'ceph::osd' :
|
class { 'ceph::osd' :
|
||||||
public_address => $public_address,
|
public_address => $public_address,
|
||||||
|
@@ -13,7 +13,7 @@
|
|||||||
# License for the specific language governing permissions and limitations
|
# License for the specific language governing permissions and limitations
|
||||||
# under the License.
|
# under the License.
|
||||||
#
|
#
|
||||||
class privatecloud::storage::rbd::pools(
|
class cloud::storage::rbd::pools(
|
||||||
$setup_pools = false,
|
$setup_pools = false,
|
||||||
$glance_pool = 'ceph_glance',
|
$glance_pool = 'ceph_glance',
|
||||||
$glance_user = 'glance',
|
$glance_user = 'glance',
|
||||||
@@ -70,7 +70,7 @@ osd 'allow class-read object_prefix rbd_children, allow rwx pool=${glance_pool},
|
|||||||
# }
|
# }
|
||||||
|
|
||||||
@@file { '/etc/ceph/secret.xml':
|
@@file { '/etc/ceph/secret.xml':
|
||||||
content => template('privatecloud/storage/ceph/secret-compute.xml.erb'),
|
content => template('cloud/storage/ceph/secret-compute.xml.erb'),
|
||||||
tag => 'ceph_compute_secret_file',
|
tag => 'ceph_compute_secret_file',
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@@ -16,7 +16,7 @@
|
|||||||
# Used by Controller, Storage, Network and Compute nodes
|
# Used by Controller, Storage, Network and Compute nodes
|
||||||
#
|
#
|
||||||
|
|
||||||
class privatecloud::telemetry(
|
class cloud::telemetry(
|
||||||
$ceilometer_secret = $os_params::ceilometer_secret,
|
$ceilometer_secret = $os_params::ceilometer_secret,
|
||||||
$rabbit_hosts = $os_params::rabbit_hosts,
|
$rabbit_hosts = $os_params::rabbit_hosts,
|
||||||
$rabbit_password = $os_params::rabbit_password,
|
$rabbit_password = $os_params::rabbit_password,
|
||||||
|
@@ -17,11 +17,11 @@
|
|||||||
# Could be managed by spof node as Active / Passive.
|
# Could be managed by spof node as Active / Passive.
|
||||||
#
|
#
|
||||||
|
|
||||||
class privatecloud::telemetry::centralagent(
|
class cloud::telemetry::centralagent(
|
||||||
$enabled = true,
|
$enabled = true,
|
||||||
){
|
){
|
||||||
|
|
||||||
include 'privatecloud::telemetry'
|
include 'cloud::telemetry'
|
||||||
|
|
||||||
class { 'ceilometer::agent::central':
|
class { 'ceilometer::agent::central':
|
||||||
enabled => $enabled,
|
enabled => $enabled,
|
||||||
|
@@ -16,7 +16,7 @@
|
|||||||
# Telemetry server nodes
|
# Telemetry server nodes
|
||||||
#
|
#
|
||||||
|
|
||||||
class privatecloud::telemetry::server(
|
class cloud::telemetry::server(
|
||||||
$ks_keystone_internal_host = $os_params::ks_keystone_internal_host,
|
$ks_keystone_internal_host = $os_params::ks_keystone_internal_host,
|
||||||
$ks_keystone_internal_proto = $os_params::ks_keystone_internal_proto,
|
$ks_keystone_internal_proto = $os_params::ks_keystone_internal_proto,
|
||||||
$ks_ceilometer_internal_port = $os_params::ks_ceilometer_internal_port,
|
$ks_ceilometer_internal_port = $os_params::ks_ceilometer_internal_port,
|
||||||
@@ -25,7 +25,7 @@ class privatecloud::telemetry::server(
|
|||||||
$api_eth = $os_params::api_eth,
|
$api_eth = $os_params::api_eth,
|
||||||
){
|
){
|
||||||
|
|
||||||
include 'privatecloud::telemetry'
|
include 'cloud::telemetry'
|
||||||
|
|
||||||
# Install MongoDB database
|
# Install MongoDB database
|
||||||
class { 'ceilometer::db':
|
class { 'ceilometer::db':
|
||||||
|
@@ -16,7 +16,7 @@
|
|||||||
# Volume Common
|
# Volume Common
|
||||||
#
|
#
|
||||||
|
|
||||||
class privatecloud::volume(
|
class cloud::volume(
|
||||||
$cinder_db_host = $os_params::cinder_db_host,
|
$cinder_db_host = $os_params::cinder_db_host,
|
||||||
$cinder_db_user = $os_params::cinder_db_user,
|
$cinder_db_user = $os_params::cinder_db_user,
|
||||||
$cinder_db_password = $os_params::cinder_db_password,
|
$cinder_db_password = $os_params::cinder_db_password,
|
||||||
|
@@ -16,7 +16,7 @@
|
|||||||
# Volume controller
|
# Volume controller
|
||||||
#
|
#
|
||||||
|
|
||||||
class privatecloud::volume::controller(
|
class cloud::volume::controller(
|
||||||
$ks_cinder_internal_port = $os_params::ks_cinder_internal_port,
|
$ks_cinder_internal_port = $os_params::ks_cinder_internal_port,
|
||||||
$ks_cinder_password = $os_params::ks_cinder_password,
|
$ks_cinder_password = $os_params::ks_cinder_password,
|
||||||
$ks_keystone_internal_host = $os_params::ks_keystone_internal_host,
|
$ks_keystone_internal_host = $os_params::ks_keystone_internal_host,
|
||||||
@@ -26,7 +26,7 @@ class privatecloud::volume::controller(
|
|||||||
$backup_ceph_user = 'cinder'
|
$backup_ceph_user = 'cinder'
|
||||||
) {
|
) {
|
||||||
|
|
||||||
include 'privatecloud::volume'
|
include 'cloud::volume'
|
||||||
|
|
||||||
class { 'cinder::scheduler': }
|
class { 'cinder::scheduler': }
|
||||||
|
|
||||||
|
@@ -16,14 +16,14 @@
|
|||||||
# Volume storage
|
# Volume storage
|
||||||
#
|
#
|
||||||
|
|
||||||
class privatecloud::volume::storage(
|
class cloud::volume::storage(
|
||||||
$glance_api_version = $os_params::glance_api_version,
|
$glance_api_version = $os_params::glance_api_version,
|
||||||
$cinder_rbd_pool = 'ceph_cinder',
|
$cinder_rbd_pool = 'ceph_cinder',
|
||||||
$cinder_rbd_user = 'cinder',
|
$cinder_rbd_user = 'cinder',
|
||||||
$cinder_rbd_secret_uuid = $os_params::cinder_rbd_secret_uuid,
|
$cinder_rbd_secret_uuid = $os_params::cinder_rbd_secret_uuid,
|
||||||
) {
|
) {
|
||||||
|
|
||||||
include 'privatecloud::volume'
|
include 'cloud::volume'
|
||||||
|
|
||||||
class { 'cinder::volume::rbd':
|
class { 'cinder::volume::rbd':
|
||||||
rbd_pool => $cinder_rbd_pool,
|
rbd_pool => $cinder_rbd_pool,
|
||||||
|
@@ -13,12 +13,12 @@
|
|||||||
# License for the specific language governing permissions and limitations
|
# License for the specific language governing permissions and limitations
|
||||||
# under the License.
|
# under the License.
|
||||||
#
|
#
|
||||||
# Unit tests for privatecloud::cache
|
# Unit tests for cloud::cache
|
||||||
#
|
#
|
||||||
|
|
||||||
require 'spec_helper'
|
require 'spec_helper'
|
||||||
|
|
||||||
describe 'privatecloud::cache' do
|
describe 'cloud::cache' do
|
||||||
|
|
||||||
shared_examples_for 'cache server' do
|
shared_examples_for 'cache server' do
|
||||||
|
|
||||||
|
@@ -13,17 +13,17 @@
|
|||||||
# License for the specific language governing permissions and limitations
|
# License for the specific language governing permissions and limitations
|
||||||
# under the License.
|
# under the License.
|
||||||
#
|
#
|
||||||
# Unit tests for privatecloud::compute::controller class
|
# Unit tests for cloud::compute::controller class
|
||||||
#
|
#
|
||||||
|
|
||||||
require 'spec_helper'
|
require 'spec_helper'
|
||||||
|
|
||||||
describe 'privatecloud::compute::controller' do
|
describe 'cloud::compute::controller' do
|
||||||
|
|
||||||
shared_examples_for 'openstack compute controller' do
|
shared_examples_for 'openstack compute controller' do
|
||||||
|
|
||||||
let :pre_condition do
|
let :pre_condition do
|
||||||
"class { 'privatecloud::compute':
|
"class { 'cloud::compute':
|
||||||
nova_db_host => '10.0.0.1',
|
nova_db_host => '10.0.0.1',
|
||||||
nova_db_user => 'nova',
|
nova_db_user => 'nova',
|
||||||
nova_db_password => 'secrete',
|
nova_db_password => 'secrete',
|
||||||
|
@@ -13,17 +13,17 @@
|
|||||||
# License for the specific language governing permissions and limitations
|
# License for the specific language governing permissions and limitations
|
||||||
# under the License.
|
# under the License.
|
||||||
#
|
#
|
||||||
# Unit tests for privatecloud::compute::hypervisor class
|
# Unit tests for cloud::compute::hypervisor class
|
||||||
#
|
#
|
||||||
|
|
||||||
require 'spec_helper'
|
require 'spec_helper'
|
||||||
|
|
||||||
describe 'privatecloud::compute::hypervisor' do
|
describe 'cloud::compute::hypervisor' do
|
||||||
|
|
||||||
shared_examples_for 'openstack compute hypervisor' do
|
shared_examples_for 'openstack compute hypervisor' do
|
||||||
|
|
||||||
let :pre_condition do
|
let :pre_condition do
|
||||||
"class { 'privatecloud::compute':
|
"class { 'cloud::compute':
|
||||||
nova_db_host => '10.0.0.1',
|
nova_db_host => '10.0.0.1',
|
||||||
nova_db_user => 'nova',
|
nova_db_user => 'nova',
|
||||||
nova_db_password => 'secrete',
|
nova_db_password => 'secrete',
|
||||||
|
@@ -13,12 +13,12 @@
|
|||||||
# License for the specific language governing permissions and limitations
|
# License for the specific language governing permissions and limitations
|
||||||
# under the License.
|
# under the License.
|
||||||
#
|
#
|
||||||
# Unit tests for privatecloud::dashboard class
|
# Unit tests for cloud::dashboard class
|
||||||
#
|
#
|
||||||
|
|
||||||
require 'spec_helper'
|
require 'spec_helper'
|
||||||
|
|
||||||
describe 'privatecloud::dashboard' do
|
describe 'cloud::dashboard' do
|
||||||
|
|
||||||
shared_examples_for 'openstack dashboard' do
|
shared_examples_for 'openstack dashboard' do
|
||||||
|
|
||||||
|
@@ -13,12 +13,12 @@
|
|||||||
# License for the specific language governing permissions and limitations
|
# License for the specific language governing permissions and limitations
|
||||||
# under the License.
|
# under the License.
|
||||||
#
|
#
|
||||||
# Unit tests for privatecloud::database:nosql class
|
# Unit tests for cloud::database:nosql class
|
||||||
#
|
#
|
||||||
|
|
||||||
require 'spec_helper'
|
require 'spec_helper'
|
||||||
|
|
||||||
describe 'privatecloud::database::nosql' do
|
describe 'cloud::database::nosql' do
|
||||||
|
|
||||||
shared_examples_for 'openstack database nosql' do
|
shared_examples_for 'openstack database nosql' do
|
||||||
|
|
||||||
|
@@ -13,12 +13,12 @@
|
|||||||
# License for the specific language governing permissions and limitations
|
# License for the specific language governing permissions and limitations
|
||||||
# under the License.
|
# under the License.
|
||||||
#
|
#
|
||||||
# Unit tests for privatecloud::database::sql class
|
# Unit tests for cloud::database::sql class
|
||||||
#
|
#
|
||||||
|
|
||||||
require 'spec_helper'
|
require 'spec_helper'
|
||||||
|
|
||||||
describe 'privatecloud::database::sql' do
|
describe 'cloud::database::sql' do
|
||||||
|
|
||||||
shared_examples_for 'openstack database sql' do
|
shared_examples_for 'openstack database sql' do
|
||||||
|
|
||||||
|
@@ -13,12 +13,12 @@
|
|||||||
# License for the specific language governing permissions and limitations
|
# License for the specific language governing permissions and limitations
|
||||||
# under the License.
|
# under the License.
|
||||||
#
|
#
|
||||||
# Unit tests for privatecloud::identity class
|
# Unit tests for cloud::identity class
|
||||||
#
|
#
|
||||||
|
|
||||||
require 'spec_helper'
|
require 'spec_helper'
|
||||||
|
|
||||||
describe 'privatecloud::identity' do
|
describe 'cloud::identity' do
|
||||||
|
|
||||||
shared_examples_for 'openstack identity' do
|
shared_examples_for 'openstack identity' do
|
||||||
|
|
||||||
|
@@ -13,12 +13,12 @@
|
|||||||
# License for the specific language governing permissions and limitations
|
# License for the specific language governing permissions and limitations
|
||||||
# under the License.
|
# under the License.
|
||||||
#
|
#
|
||||||
# Unit tests for privatecloud::image class
|
# Unit tests for cloud::image class
|
||||||
#
|
#
|
||||||
|
|
||||||
require 'spec_helper'
|
require 'spec_helper'
|
||||||
|
|
||||||
describe 'privatecloud::image' do
|
describe 'cloud::image' do
|
||||||
|
|
||||||
shared_examples_for 'openstack image' do
|
shared_examples_for 'openstack image' do
|
||||||
|
|
||||||
|
@@ -13,12 +13,12 @@
|
|||||||
# License for the specific language governing permissions and limitations
|
# License for the specific language governing permissions and limitations
|
||||||
# under the License.
|
# under the License.
|
||||||
#
|
#
|
||||||
# Unit tests for privatecloud
|
# Unit tests for cloud
|
||||||
#
|
#
|
||||||
|
|
||||||
require 'spec_helper'
|
require 'spec_helper'
|
||||||
|
|
||||||
describe 'privatecloud' do
|
describe 'cloud' do
|
||||||
|
|
||||||
shared_examples_for 'private cloud node' do
|
shared_examples_for 'private cloud node' do
|
||||||
|
|
||||||
|
@@ -13,12 +13,12 @@
|
|||||||
# License for the specific language governing permissions and limitations
|
# License for the specific language governing permissions and limitations
|
||||||
# under the License.
|
# under the License.
|
||||||
#
|
#
|
||||||
# Unit tests for privatecloud::loadbalancer class
|
# Unit tests for cloud::loadbalancer class
|
||||||
#
|
#
|
||||||
|
|
||||||
require 'spec_helper'
|
require 'spec_helper'
|
||||||
|
|
||||||
describe 'privatecloud::loadbalancer' do
|
describe 'cloud::loadbalancer' do
|
||||||
|
|
||||||
shared_examples_for 'openstack loadbalancer' do
|
shared_examples_for 'openstack loadbalancer' do
|
||||||
|
|
||||||
|
@@ -13,12 +13,12 @@
|
|||||||
# License for the specific language governing permissions and limitations
|
# License for the specific language governing permissions and limitations
|
||||||
# under the License.
|
# under the License.
|
||||||
#
|
#
|
||||||
# Unit tests for privatecloud::messaging class
|
# Unit tests for cloud::messaging class
|
||||||
#
|
#
|
||||||
|
|
||||||
require 'spec_helper'
|
require 'spec_helper'
|
||||||
|
|
||||||
describe 'privatecloud::messaging' do
|
describe 'cloud::messaging' do
|
||||||
|
|
||||||
shared_examples_for 'openstack messaging' do
|
shared_examples_for 'openstack messaging' do
|
||||||
|
|
||||||
|
@@ -13,17 +13,17 @@
|
|||||||
# License for the specific language governing permissions and limitations
|
# License for the specific language governing permissions and limitations
|
||||||
# under the License.
|
# under the License.
|
||||||
#
|
#
|
||||||
# Unit tests for privatecloud::network::compute class
|
# Unit tests for cloud::network::compute class
|
||||||
#
|
#
|
||||||
|
|
||||||
require 'spec_helper'
|
require 'spec_helper'
|
||||||
|
|
||||||
describe 'privatecloud::network::compute' do
|
describe 'cloud::network::compute' do
|
||||||
|
|
||||||
shared_examples_for 'openstack network compute' do
|
shared_examples_for 'openstack network compute' do
|
||||||
|
|
||||||
let :pre_condition do
|
let :pre_condition do
|
||||||
"class { 'privatecloud::network':
|
"class { 'cloud::network':
|
||||||
rabbit_hosts => ['10.0.0.1'],
|
rabbit_hosts => ['10.0.0.1'],
|
||||||
rabbit_password => 'secrete',
|
rabbit_password => 'secrete',
|
||||||
tunnel_eth => '10.0.1.1',
|
tunnel_eth => '10.0.1.1',
|
||||||
|
@@ -13,17 +13,17 @@
|
|||||||
# License for the specific language governing permissions and limitations
|
# License for the specific language governing permissions and limitations
|
||||||
# under the License.
|
# under the License.
|
||||||
#
|
#
|
||||||
# Unit tests for privatecloud::network::controller class
|
# Unit tests for cloud::network::controller class
|
||||||
#
|
#
|
||||||
|
|
||||||
require 'spec_helper'
|
require 'spec_helper'
|
||||||
|
|
||||||
describe 'privatecloud::network::controller' do
|
describe 'cloud::network::controller' do
|
||||||
|
|
||||||
shared_examples_for 'openstack network controller' do
|
shared_examples_for 'openstack network controller' do
|
||||||
|
|
||||||
let :pre_condition do
|
let :pre_condition do
|
||||||
"class { 'privatecloud::network':
|
"class { 'cloud::network':
|
||||||
rabbit_hosts => ['10.0.0.1'],
|
rabbit_hosts => ['10.0.0.1'],
|
||||||
rabbit_password => 'secrete',
|
rabbit_password => 'secrete',
|
||||||
tunnel_eth => '10.0.1.1',
|
tunnel_eth => '10.0.1.1',
|
||||||
|
@@ -13,17 +13,17 @@
|
|||||||
# License for the specific language governing permissions and limitations
|
# License for the specific language governing permissions and limitations
|
||||||
# under the License.
|
# under the License.
|
||||||
#
|
#
|
||||||
# Unit tests for privatecloud::network::dhcp class
|
# Unit tests for cloud::network::dhcp class
|
||||||
#
|
#
|
||||||
|
|
||||||
require 'spec_helper'
|
require 'spec_helper'
|
||||||
|
|
||||||
describe 'privatecloud::network::dhcp' do
|
describe 'cloud::network::dhcp' do
|
||||||
|
|
||||||
shared_examples_for 'openstack network dhcp' do
|
shared_examples_for 'openstack network dhcp' do
|
||||||
|
|
||||||
let :pre_condition do
|
let :pre_condition do
|
||||||
"class { 'privatecloud::network':
|
"class { 'cloud::network':
|
||||||
rabbit_hosts => ['10.0.0.1'],
|
rabbit_hosts => ['10.0.0.1'],
|
||||||
rabbit_password => 'secrete',
|
rabbit_password => 'secrete',
|
||||||
tunnel_eth => '10.0.1.1',
|
tunnel_eth => '10.0.1.1',
|
||||||
|
@@ -13,17 +13,17 @@
|
|||||||
# License for the specific language governing permissions and limitations
|
# License for the specific language governing permissions and limitations
|
||||||
# under the License.
|
# under the License.
|
||||||
#
|
#
|
||||||
# Unit tests for privatecloud::network::l3 class
|
# Unit tests for cloud::network::l3 class
|
||||||
#
|
#
|
||||||
|
|
||||||
require 'spec_helper'
|
require 'spec_helper'
|
||||||
|
|
||||||
describe 'privatecloud::network::l3' do
|
describe 'cloud::network::l3' do
|
||||||
|
|
||||||
shared_examples_for 'openstack network l3' do
|
shared_examples_for 'openstack network l3' do
|
||||||
|
|
||||||
let :pre_condition do
|
let :pre_condition do
|
||||||
"class { 'privatecloud::network':
|
"class { 'cloud::network':
|
||||||
rabbit_hosts => ['10.0.0.1'],
|
rabbit_hosts => ['10.0.0.1'],
|
||||||
rabbit_password => 'secrete',
|
rabbit_password => 'secrete',
|
||||||
tunnel_eth => '10.0.1.1',
|
tunnel_eth => '10.0.1.1',
|
||||||
|
@@ -13,17 +13,17 @@
|
|||||||
# License for the specific language governing permissions and limitations
|
# License for the specific language governing permissions and limitations
|
||||||
# under the License.
|
# under the License.
|
||||||
#
|
#
|
||||||
# Unit tests for privatecloud::network::lbaas class
|
# Unit tests for cloud::network::lbaas class
|
||||||
#
|
#
|
||||||
|
|
||||||
require 'spec_helper'
|
require 'spec_helper'
|
||||||
|
|
||||||
describe 'privatecloud::network::lbaas' do
|
describe 'cloud::network::lbaas' do
|
||||||
|
|
||||||
shared_examples_for 'openstack network lbaas' do
|
shared_examples_for 'openstack network lbaas' do
|
||||||
|
|
||||||
let :pre_condition do
|
let :pre_condition do
|
||||||
"class { 'privatecloud::network':
|
"class { 'cloud::network':
|
||||||
rabbit_hosts => ['10.0.0.1'],
|
rabbit_hosts => ['10.0.0.1'],
|
||||||
rabbit_password => 'secrete',
|
rabbit_password => 'secrete',
|
||||||
tunnel_eth => '10.0.1.1',
|
tunnel_eth => '10.0.1.1',
|
||||||
|
@@ -13,17 +13,17 @@
|
|||||||
# License for the specific language governing permissions and limitations
|
# License for the specific language governing permissions and limitations
|
||||||
# under the License.
|
# under the License.
|
||||||
#
|
#
|
||||||
# Unit tests for privatecloud::network::metadata class
|
# Unit tests for cloud::network::metadata class
|
||||||
#
|
#
|
||||||
|
|
||||||
require 'spec_helper'
|
require 'spec_helper'
|
||||||
|
|
||||||
describe 'privatecloud::network::metadata' do
|
describe 'cloud::network::metadata' do
|
||||||
|
|
||||||
shared_examples_for 'openstack network metadata' do
|
shared_examples_for 'openstack network metadata' do
|
||||||
|
|
||||||
let :pre_condition do
|
let :pre_condition do
|
||||||
"class { 'privatecloud::network':
|
"class { 'cloud::network':
|
||||||
rabbit_hosts => ['10.0.0.1'],
|
rabbit_hosts => ['10.0.0.1'],
|
||||||
rabbit_password => 'secrete',
|
rabbit_password => 'secrete',
|
||||||
tunnel_eth => '10.0.1.1',
|
tunnel_eth => '10.0.1.1',
|
||||||
|
@@ -13,17 +13,17 @@
|
|||||||
# License for the specific language governing permissions and limitations
|
# License for the specific language governing permissions and limitations
|
||||||
# under the License.
|
# under the License.
|
||||||
#
|
#
|
||||||
# Unit tests for privatecloud::network::vpnaas class
|
# Unit tests for cloud::network::vpnaas class
|
||||||
#
|
#
|
||||||
|
|
||||||
require 'spec_helper'
|
require 'spec_helper'
|
||||||
|
|
||||||
describe 'privatecloud::network::vpn' do
|
describe 'cloud::network::vpn' do
|
||||||
|
|
||||||
shared_examples_for 'openstack network vpnaas' do
|
shared_examples_for 'openstack network vpnaas' do
|
||||||
|
|
||||||
let :pre_condition do
|
let :pre_condition do
|
||||||
"class { 'privatecloud::network':
|
"class { 'cloud::network':
|
||||||
rabbit_hosts => ['10.0.0.1'],
|
rabbit_hosts => ['10.0.0.1'],
|
||||||
rabbit_password => 'secrete',
|
rabbit_password => 'secrete',
|
||||||
tunnel_eth => '10.0.1.1',
|
tunnel_eth => '10.0.1.1',
|
||||||
|
@@ -13,17 +13,17 @@
|
|||||||
# License for the specific language governing permissions and limitations
|
# License for the specific language governing permissions and limitations
|
||||||
# under the License.
|
# under the License.
|
||||||
#
|
#
|
||||||
# Unit tests for privatecloud::orchestration::api class
|
# Unit tests for cloud::orchestration::api class
|
||||||
#
|
#
|
||||||
|
|
||||||
require 'spec_helper'
|
require 'spec_helper'
|
||||||
|
|
||||||
describe 'privatecloud::orchestration::api' do
|
describe 'cloud::orchestration::api' do
|
||||||
|
|
||||||
shared_examples_for 'openstack orchestration api' do
|
shared_examples_for 'openstack orchestration api' do
|
||||||
|
|
||||||
let :pre_condition do
|
let :pre_condition do
|
||||||
"class { 'privatecloud::orchestration':
|
"class { 'cloud::orchestration':
|
||||||
rabbit_hosts => ['10.0.0.1'],
|
rabbit_hosts => ['10.0.0.1'],
|
||||||
rabbit_password => 'secrete',
|
rabbit_password => 'secrete',
|
||||||
ks_keystone_internal_host => '10.0.0.1',
|
ks_keystone_internal_host => '10.0.0.1',
|
||||||
|
@@ -13,17 +13,17 @@
|
|||||||
# License for the specific language governing permissions and limitations
|
# License for the specific language governing permissions and limitations
|
||||||
# under the License.
|
# under the License.
|
||||||
#
|
#
|
||||||
# Unit tests for privatecloud::orchestration::engine class
|
# Unit tests for cloud::orchestration::engine class
|
||||||
#
|
#
|
||||||
|
|
||||||
require 'spec_helper'
|
require 'spec_helper'
|
||||||
|
|
||||||
describe 'privatecloud::orchestration::engine' do
|
describe 'cloud::orchestration::engine' do
|
||||||
|
|
||||||
shared_examples_for 'openstack orchestration engine' do
|
shared_examples_for 'openstack orchestration engine' do
|
||||||
|
|
||||||
let :pre_condition do
|
let :pre_condition do
|
||||||
"class { 'privatecloud::orchestration':
|
"class { 'cloud::orchestration':
|
||||||
rabbit_hosts => ['10.0.0.1'],
|
rabbit_hosts => ['10.0.0.1'],
|
||||||
rabbit_password => 'secrete',
|
rabbit_password => 'secrete',
|
||||||
ks_keystone_internal_host => '10.0.0.1',
|
ks_keystone_internal_host => '10.0.0.1',
|
||||||
|
@@ -13,17 +13,17 @@
|
|||||||
# License for the specific language governing permissions and limitations
|
# License for the specific language governing permissions and limitations
|
||||||
# under the License.
|
# under the License.
|
||||||
#
|
#
|
||||||
# Unit tests for privatecloud::telemetry::server class
|
# Unit tests for cloud::telemetry::server class
|
||||||
#
|
#
|
||||||
|
|
||||||
require 'spec_helper'
|
require 'spec_helper'
|
||||||
|
|
||||||
describe 'privatecloud::telemetry::centralagent' do
|
describe 'cloud::telemetry::centralagent' do
|
||||||
|
|
||||||
shared_examples_for 'openstack telemetry central agent' do
|
shared_examples_for 'openstack telemetry central agent' do
|
||||||
|
|
||||||
let :pre_condition do
|
let :pre_condition do
|
||||||
"class { 'privatecloud::telemetry':
|
"class { 'cloud::telemetry':
|
||||||
ceilometer_secret => 'secrete',
|
ceilometer_secret => 'secrete',
|
||||||
rabbit_hosts => ['10.0.0.1'],
|
rabbit_hosts => ['10.0.0.1'],
|
||||||
rabbit_password => 'secrete',
|
rabbit_password => 'secrete',
|
||||||
|
@@ -13,17 +13,17 @@
|
|||||||
# License for the specific language governing permissions and limitations
|
# License for the specific language governing permissions and limitations
|
||||||
# under the License.
|
# under the License.
|
||||||
#
|
#
|
||||||
# Unit tests for privatecloud::telemetry::server class
|
# Unit tests for cloud::telemetry::server class
|
||||||
#
|
#
|
||||||
|
|
||||||
require 'spec_helper'
|
require 'spec_helper'
|
||||||
|
|
||||||
describe 'privatecloud::telemetry::server' do
|
describe 'cloud::telemetry::server' do
|
||||||
|
|
||||||
shared_examples_for 'openstack telemetry server' do
|
shared_examples_for 'openstack telemetry server' do
|
||||||
|
|
||||||
let :pre_condition do
|
let :pre_condition do
|
||||||
"class { 'privatecloud::telemetry':
|
"class { 'cloud::telemetry':
|
||||||
ceilometer_secret => 'secrete',
|
ceilometer_secret => 'secrete',
|
||||||
rabbit_hosts => ['10.0.0.1'],
|
rabbit_hosts => ['10.0.0.1'],
|
||||||
rabbit_password => 'secrete',
|
rabbit_password => 'secrete',
|
||||||
|
@@ -13,17 +13,17 @@
|
|||||||
# License for the specific language governing permissions and limitations
|
# License for the specific language governing permissions and limitations
|
||||||
# under the License.
|
# under the License.
|
||||||
#
|
#
|
||||||
# Unit tests for privatecloud::volume::controller class
|
# Unit tests for cloud::volume::controller class
|
||||||
#
|
#
|
||||||
|
|
||||||
require 'spec_helper'
|
require 'spec_helper'
|
||||||
|
|
||||||
describe 'privatecloud::volume::controller' do
|
describe 'cloud::volume::controller' do
|
||||||
|
|
||||||
shared_examples_for 'openstack volume controller' do
|
shared_examples_for 'openstack volume controller' do
|
||||||
|
|
||||||
let :pre_condition do
|
let :pre_condition do
|
||||||
"class { 'privatecloud::volume':
|
"class { 'cloud::volume':
|
||||||
cinder_db_host => '10.0.0.1',
|
cinder_db_host => '10.0.0.1',
|
||||||
cinder_db_user => 'cinder',
|
cinder_db_user => 'cinder',
|
||||||
cinder_db_password => 'secrete',
|
cinder_db_password => 'secrete',
|
||||||
|
@@ -13,17 +13,17 @@
|
|||||||
# License for the specific language governing permissions and limitations
|
# License for the specific language governing permissions and limitations
|
||||||
# under the License.
|
# under the License.
|
||||||
#
|
#
|
||||||
# Unit tests for privatecloud::volume::storage class
|
# Unit tests for cloud::volume::storage class
|
||||||
#
|
#
|
||||||
|
|
||||||
require 'spec_helper'
|
require 'spec_helper'
|
||||||
|
|
||||||
describe 'privatecloud::volume::storage' do
|
describe 'cloud::volume::storage' do
|
||||||
|
|
||||||
shared_examples_for 'openstack volume storage' do
|
shared_examples_for 'openstack volume storage' do
|
||||||
|
|
||||||
let :pre_condition do
|
let :pre_condition do
|
||||||
"class { 'privatecloud::volume':
|
"class { 'cloud::volume':
|
||||||
cinder_db_host => '10.0.0.1',
|
cinder_db_host => '10.0.0.1',
|
||||||
cinder_db_user => 'cinder',
|
cinder_db_user => 'cinder',
|
||||||
cinder_db_password => 'secrete',
|
cinder_db_password => 'secrete',
|
||||||
|
@@ -1,5 +1,5 @@
|
|||||||
# MANAGED BY PUPPET
|
# MANAGED BY PUPPET
|
||||||
# Module:: privatecloud::database::sql
|
# Module:: cloud::database::sql
|
||||||
#
|
#
|
||||||
[mysqld]
|
[mysqld]
|
||||||
max_connections = 1000
|
max_connections = 1000
|
||||||
|
Reference in New Issue
Block a user